Sakshi from KushoAIsoftware-deep-dives.hashnode.dev·Dec 4, 2024Modern Security Vulnerabilities: Lessons from Recent BreachesThis blog is written by Jeremy Rivera at KushoAI. We're building the fastest way to test your APIs. It's completely free and you can sign up here. In recent years, big tech has witnessed a series of high-profile security incidents that serve as cruci...Discuss#cybersecurity
Zexus Solution12-best-essential-skills-for-web-app-maintenance-zexus-solution.hashnode.dev·Oct 14, 202412 Best Essential Skills for Web App MaintenanceMaintaining a web application requires continuous attention to detail, an in-depth understanding of both the app’s structure and user needs, and a proactive approach to anticipating potential issues. Whether you’re a solo developer managing multiple ...DiscussWeb App Maintenance
Ravi Patelravipatel.hashnode.dev·Oct 9, 2024Building Cryptocurrency Apps with Flutter: A Developer’s GuideCryptocurrency has been gaining global traction, transforming from a niche concept into a multi-billion-dollar industry. Developers, now more than ever, are tasked with building apps that track prices, manage wallets, and perform crypto transactions....DiscussFlutter Nik
Aamir Patelaamirpatel.hashnode.dev·Sep 6, 2024Implementing DAST in DevSecOpsIn today’s fast-paced software development landscape, ensuring the security of applications is a critical priority. With the rise of DevSecOps—the integration of security practices within the DevOps pipeline—organizations can automate security checks...DiscussDevSecOps
Sam Atinksonsamatinkson.hashnode.dev·Aug 21, 2024Implementing App Security – Here’s How To Do ItApplication security incorporates measures to prevent unauthorized access, data breaches, and other security threats in software development. It’s essential to implement proper security measures to ensure the safety of your applications; this entails...Discussapp security
Nikhil Akkinikhilakki.in·Jul 6, 2024Battle of the Auths: Session Cookies vs. JWTsChoosing between session cookies and JWT (JSON Web Tokens) for authentication in a web SPA (Single Page Application) depends on several factors, including security, ease of implementation, scalability, and specific use case requirements. Here's a com...DiscussSession-cookies
ByteScrum TechnologiesforByteScrum Technologiesblog.bytescrum.com·Jun 24, 2024Building Secure Applications: Best Practices for DevelopersIn an increasingly digital world, security is paramount. As developers, it’s our responsibility to ensure that the applications we build are robust and secure, protecting user data and maintaining trust. Here are some essential best practices to foll...Dhananjay kulkarni and 1 other are discussing this2 people are discussing thisDiscuss·66 likes·84 readsPythonapp security
Pratik Mhatrepnmhatre.hashnode.dev·Jun 7, 2024Unlocking the Secrets to Android App Security: An IntroductionIn today's world, mobile applications play a crucial role in our daily lives, making the security of these applications more important than ever. As developers, it's our responsibility to protect our users' data and privacy. This blog series aims to ...DiscussAndroid
Abhayabhayit2000.hashnode.dev·Jan 23, 2024Implementing App Security – Here’s How To Do ItApplication security incorporates measures to prevent unauthorized access, data breaches, and other security threats in software development. It’s essential to implement proper security measures to ensure the safety of your applications; this entails...Discuss·105 readsMobile apps
Jayakumar Sakthivelcloudwithjk.hashnode.dev·Dec 27, 2023Understanding API Gateways: An Introduction to Kong API Gateway: Part-1Introduction Discover the groundbreaking Kong API Gateway, a powerhouse redefining API management. Uncover its intuitive design, top-notch security, and unmatched scalability in this series. Join us to explore its impact on industries and its role in...Discuss·48 readsAPI Gateway